URL:

https://browser.yandex.com/

Full analysis: https://app.any.run/tasks/b39d611b-c958-484e-bf63-ec249279507c
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 09, 2023, 01:15:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealer
Indicators:
MD5:

D121EBB4C6C5BA79CCE75CFE2CF3F102

SHA1:

97507A88E661E9B3B224F68C709F2C8B119C9C1D

SHA256:

8A932E72B2215EBF589E51D0A2B079990503720F2598FF533B91CC873B0D8BFB

SSDEEP:

3:N8Ucoiy:20z

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • yb32C7.tmp (PID: 2096)
      • setup.exe (PID: 3912)
      • service_update.exe (PID: 2960)
      • browser.exe (PID: 2504)
    • Actions looks like stealing of personal data

      • setup.exe (PID: 2612)
      • service_update.exe (PID: 2960)
      • service_update.exe (PID: 2948)
      • service_update.exe (PID: 3120)
      • service_update.exe (PID: 2688)
      • service_update.exe (PID: 2692)
      • clidmgr.exe (PID: 3228)
      • service_update.exe (PID: 1232)
      • clidmgr.exe (PID: 3536)
      • setup.exe (PID: 3912)
      • browser.exe (PID: 3576)
      • browser.exe (PID: 3996)
      • browser.exe (PID: 2984)
      • browser.exe (PID: 2492)
      • browser.exe (PID: 2668)
      • browser.exe (PID: 3900)
      • browser.exe (PID: 4080)
      • browser.exe (PID: 3204)
      • browser.exe (PID: 2292)
      • browser.exe (PID: 3924)
      • browser.exe (PID: 1508)
      • browser.exe (PID: 1696)
      • browser.exe (PID: 1820)
      • browser.exe (PID: 3760)
      • browser.exe (PID: 2336)
      • browser.exe (PID: 2724)
      • browser.exe (PID: 2648)
      • browser.exe (PID: 2252)
      • browser.exe (PID: 3004)
      • browser.exe (PID: 3752)
      • browser.exe (PID: 3544)
      • browser.exe (PID: 3768)
      • browser.exe (PID: 304)
      • browser.exe (PID: 2456)
      • browser.exe (PID: 2584)
      • browser.exe (PID: 2836)
      • browser.exe (PID: 3792)
      • browser.exe (PID: 3072)
      • browser.exe (PID: 3200)
      • browser.exe (PID: 732)
      • browser.exe (PID: 2156)
      • browser.exe (PID: 3092)
      • browser.exe (PID: 3960)
      • browser.exe (PID: 3040)
      • browser.exe (PID: 1760)
      • browser.exe (PID: 2380)
      • browser.exe (PID: 3856)
      • browser.exe (PID: 3112)
      • browser.exe (PID: 2436)
      • browser.exe (PID: 1560)
      • browser.exe (PID: 2884)
      • browser.exe (PID: 2296)
      • browser.exe (PID: 2404)
      • browser.exe (PID: 2976)
      • browser.exe (PID: 1936)
      • browser.exe (PID: 1116)
      • browser.exe (PID: 1636)
      • browser.exe (PID: 1696)
      • browser.exe (PID: 2820)
      • browser.exe (PID: 3256)
      • browser.exe (PID: 3424)
      • browser.exe (PID: 3460)
      • browser.exe (PID: 2504)
      • browser.exe (PID: 3956)
      • browser.exe (PID: 2456)
      • browser.exe (PID: 2944)
      • browser.exe (PID: 3336)
      • browser.exe (PID: 2076)
      • browser.exe (PID: 2620)
      • browser.exe (PID: 3244)
      • browser.exe (PID: 2316)
      • browser.exe (PID: 2268)
      • browser.exe (PID: 3160)
    • Creates a writable file in the system directory

      • service_update.exe (PID: 3120)
    • Steals credentials from Web Browsers

      • browser.exe (PID: 3160)
    • Steals credentials

      • browser.exe (PID: 2292)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3848)
      • setup.exe (PID: 3912)
      • service_update.exe (PID: 2960)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2336)
    • Reads security settings of Internet Explorer

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
    • Checks Windows Trust Settings

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
    • Reads settings of System Certificates

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2336)
    • Application launched itself

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3848)
      • setup.exe (PID: 3912)
      • service_update.exe (PID: 3120)
      • service_update.exe (PID: 2688)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2292)
      • browser.exe (PID: 2336)
    • Starts application with an unusual extension

      • Yandex.exe (PID: 2384)
    • Executes as Windows Service

      • service_update.exe (PID: 3120)
    • Adds/modifies Windows certificates

      • setup.exe (PID: 3912)
    • Starts itself from another location

      • service_update.exe (PID: 2960)
    • Searches for installed software

      • setup.exe (PID: 3912)
    • Reads Mozilla Firefox installation path

      • browser.exe (PID: 3160)
  • INFO

    • Manual execution by a user

      • wmpnscfg.exe (PID: 3360)
      • browser.exe (PID: 3160)
    • Application launched itself

      • chrome.exe (PID: 3048)
    • The process uses the downloaded file

      • chrome.exe (PID: 3224)
      • chrome.exe (PID: 3048)
      • Yandex.exe (PID: 3740)
    • Checks supported languages

      • Yandex.exe (PID: 3740)
      • Yandex.exe (PID: 2384)
      • yb32C7.tmp (PID: 2096)
      • setup.exe (PID: 3848)
      • setup.exe (PID: 3912)
      • setup.exe (PID: 2612)
      • service_update.exe (PID: 2960)
      • service_update.exe (PID: 2948)
      • service_update.exe (PID: 3120)
      • service_update.exe (PID: 2692)
      • service_update.exe (PID: 1232)
      • clidmgr.exe (PID: 3228)
      • clidmgr.exe (PID: 3536)
      • service_update.exe (PID: 2688)
      • browser.exe (PID: 3576)
      • browser.exe (PID: 2492)
      • browser.exe (PID: 3996)
      • browser.exe (PID: 3160)
      • wmpnscfg.exe (PID: 3360)
      • browser.exe (PID: 2984)
      • browser.exe (PID: 2668)
      • browser.exe (PID: 3900)
      • browser.exe (PID: 3204)
      • browser.exe (PID: 4080)
      • browser.exe (PID: 1696)
      • browser.exe (PID: 2292)
      • browser.exe (PID: 2336)
      • browser.exe (PID: 3924)
      • browser.exe (PID: 1820)
      • browser.exe (PID: 1508)
      • browser.exe (PID: 3760)
      • browser.exe (PID: 2724)
      • browser.exe (PID: 3544)
      • browser.exe (PID: 3004)
      • browser.exe (PID: 304)
      • browser.exe (PID: 2648)
      • browser.exe (PID: 2584)
      • browser.exe (PID: 3092)
      • browser.exe (PID: 2252)
      • browser.exe (PID: 3752)
      • browser.exe (PID: 3768)
      • browser.exe (PID: 2836)
      • browser.exe (PID: 2456)
      • browser.exe (PID: 732)
      • browser.exe (PID: 2156)
      • browser.exe (PID: 3072)
      • browser.exe (PID: 3792)
      • browser.exe (PID: 2884)
      • browser.exe (PID: 3200)
      • browser.exe (PID: 3040)
      • browser.exe (PID: 2296)
      • browser.exe (PID: 3960)
      • browser.exe (PID: 1936)
      • browser.exe (PID: 1760)
      • browser.exe (PID: 2380)
      • browser.exe (PID: 3856)
      • browser.exe (PID: 2436)
      • browser.exe (PID: 1560)
      • browser.exe (PID: 2404)
      • browser.exe (PID: 2976)
      • browser.exe (PID: 3112)
      • browser.exe (PID: 1116)
      • browser.exe (PID: 1696)
      • browser.exe (PID: 2820)
      • browser.exe (PID: 3256)
      • browser.exe (PID: 1636)
      • browser.exe (PID: 3460)
      • browser.exe (PID: 3424)
      • browser.exe (PID: 2504)
      • browser.exe (PID: 2456)
      • browser.exe (PID: 3956)
      • browser.exe (PID: 2944)
      • browser.exe (PID: 3336)
      • browser.exe (PID: 2076)
      • browser.exe (PID: 2620)
      • browser.exe (PID: 3244)
      • browser.exe (PID: 2316)
      • browser.exe (PID: 2268)
    • Checks proxy server information

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
    • Creates files or folders in the user directory

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
      • setup.exe (PID: 2612)
      • clidmgr.exe (PID: 3228)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2984)
      • browser.exe (PID: 3924)
      • browser.exe (PID: 2336)
      • browser.exe (PID: 2456)
      • browser.exe (PID: 2268)
    • Reads the machine GUID from the registry

      • Yandex.exe (PID: 3740)
      • setup.exe (PID: 3912)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2336)
    • Reads the computer name

      • Yandex.exe (PID: 3740)
      • yb32C7.tmp (PID: 2096)
      • setup.exe (PID: 3848)
      • setup.exe (PID: 3912)
      • service_update.exe (PID: 2960)
      • service_update.exe (PID: 2948)
      • service_update.exe (PID: 3120)
      • service_update.exe (PID: 1232)
      • clidmgr.exe (PID: 3228)
      • clidmgr.exe (PID: 3536)
      • service_update.exe (PID: 2688)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2492)
      • wmpnscfg.exe (PID: 3360)
      • browser.exe (PID: 2984)
      • browser.exe (PID: 3900)
      • browser.exe (PID: 2336)
      • browser.exe (PID: 2292)
      • browser.exe (PID: 1508)
      • browser.exe (PID: 1820)
      • browser.exe (PID: 3760)
      • browser.exe (PID: 2944)
      • browser.exe (PID: 2620)
      • browser.exe (PID: 3956)
    • Create files in a temporary directory

      • Yandex.exe (PID: 3740)
      • yb32C7.tmp (PID: 2096)
      • setup.exe (PID: 3848)
      • setup.exe (PID: 3912)
      • browser.exe (PID: 3160)
      • browser.exe (PID: 2292)
      • browser.exe (PID: 2336)
    • Creates files in the program directory

      • service_update.exe (PID: 2960)
      • service_update.exe (PID: 3120)
    • Process checks computer location settings

      • browser.exe (PID: 3160)
      • browser.exe (PID: 1696)
      • browser.exe (PID: 3204)
      • browser.exe (PID: 3004)
      • browser.exe (PID: 2724)
      • browser.exe (PID: 2648)
      • browser.exe (PID: 304)
      • browser.exe (PID: 2252)
      • browser.exe (PID: 3768)
      • browser.exe (PID: 3424)
      • browser.exe (PID: 2316)
    • Drops the executable file immediately after the start

      • chrome.exe (PID: 3048)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
93
Malicious processes
79
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs wmpnscfg.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs yandex.exe yandex.exe yb32c7.tmp no specs setup.exe no specs setup.exe setup.exe service_update.exe service_update.exe service_update.exe service_update.exe service_update.exe service_update.exe clidmgr.exe clidmgr.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe browser.exe

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6a7a8b38,0x6a7a8b48,0x6a7a8b54C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
304"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --help-url=https://api.browser.yandex.com/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --ya-custo-process --enable-instaserp --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4112 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 /prefetch:1C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
732"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --process-name="Data Decoder Service" --mojo-platform-channel-handle=5728 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 --brver=23.11.1.730 /prefetch:8C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1116"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --process-name="Data Decoder Service" --mojo-platform-channel-handle=6360 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 --brver=23.11.1.730 /prefetch:8C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1232"C:\Program Files\Yandex\YandexBrowser\23.11.1.730\service_update.exe" --update-background-schedulerC:\Program Files\Yandex\YandexBrowser\23.11.1.730\service_update.exe
service_update.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
MEDIUM
Description:
Yandex
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\program files\yandex\yandexbrowser\23.11.1.730\service_update.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1508"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=gpu-process --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1736 --field-trial-handle=1740,i,6827865572396833927,6806636244492292914,262144 /prefetch:2C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1560"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --process-name="Data Decoder Service" --mojo-platform-channel-handle=5584 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 --brver=23.11.1.730 /prefetch:8C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1636"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --process-name="Data Decoder Service" --mojo-platform-channel-handle=5008 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 --brver=23.11.1.730 /prefetch:8C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1696"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=renderer --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --help-url=https://api.browser.yandex.com/redirect/help/ --user-agent-info --web-ntp-url-for-renderer=https://webntp.yandex.ru/ --translate-security-origin=https://browser.translate.yandex.net/ --enable-instaserp --allow-prefetch --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3424 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 /prefetch:1C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
1696"C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --user-id=90A491ED-82A6-41BB-8B2E-12E941B168A2 --brand-id=int --process-name="Data Decoder Service" --mojo-platform-channel-handle=6040 --field-trial-handle=1672,i,7565748882576890785,5756469300544651648,262144 --brver=23.11.1.730 /prefetch:8C:\Users\admin\AppData\Local\Yandex\YandexBrowser\Application\browser.exe
browser.exe
User:
admin
Company:
YANDEX LLC
Integrity Level:
LOW
Description:
Yandex with voice assistant Alice
Exit code:
0
Version:
23.11.1.730
Modules
Images
c:\users\admin\appdata\local\yandex\yandexbrowser\application\browser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\yandex\yandexbrowser\application\23.11.1.730\browser_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
Total events
38 499
Read events
38 217
Write events
260
Delete events
22

Modification events

(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
1
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3048) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_installdate
Value:
0
(PID) Process:(3048) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_enableddate
Value:
0
Executable files
24
Suspicious files
540
Text files
194
Unknown types
15

Dropped files

PID
Process
Filename
Type
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF2100bb.TMP
MD5:
SHA256:
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG.old~RF2101e3.TMPtext
MD5:ACAE205AB6BCFD21F8AC19ABBC47BC6A
SHA256:4972E7A3802340F7C5C214DD0CAC645F537BA6937F38CCCC36B0CACEF079F41E
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old~RF2101d4.TMPtext
MD5:65635E713D5CFC914717D1CC4CAC6989
SHA256:4CB3EEB0369758290ABD7868DFD85D663C4AEF6C727FFF43BE693FDDBD0A6C28
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Versiontext
MD5:9F941EA08DBDCA2EB3CFA1DBBBA6F5DC
SHA256:127F71DF0D2AD895D4F293E62284D85971AE047CA15F90B87BF6335898B0B655
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RF2101d4.TMPtext
MD5:A5EB529D94D3E97D0EE4A7E07700E0B2
SHA256:08D211BFC570221AF7995C0625052FA7848F7E707D559C266656CDC3A9CC9F9C
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF2106f4.TMP
MD5:
SHA256:
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG.old~RF2101c4.TMPtext
MD5:8268A4D53A6A9432A8266584CBD7D624
SHA256:F785C42945CFE320C52C763837CD41541A8CAAB3E5FD567999EED5343CF0FD7A
3048chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:43550DBA2277BE44F5F842196E084145
SHA256:D19055342C06316F8B80D0B029BD233A3E48AD4C591953AF7B712ADA7F68F403
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
150
DNS requests
144
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3048
chrome.exe
GET
200
104.18.20.226:80
http://secure.globalsign.com/cacert/codesigningrootr45.crt
unknown
binary
1.37 Kb
unknown
3740
Yandex.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?f9a2e269b33d8fdf
unknown
compressed
4.66 Kb
unknown
3048
chrome.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?0edf79035d9585ce
unknown
compressed
65.2 Kb
unknown
3740
Yandex.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?bb51744c9db2bb7c
unknown
compressed
4.66 Kb
unknown
3740
Yandex.exe
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/rootr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHUeP1PjGFkz6V8I7O6tApc%3D
unknown
binary
1.41 Kb
unknown
3740
Yandex.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?b0f405062fff667e
unknown
compressed
4.66 Kb
unknown
3740
Yandex.exe
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/rootr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDQHuXxad%2F5c1K2Rl1mo%3D
unknown
binary
1.41 Kb
unknown
3740
Yandex.exe
GET
200
104.18.21.226:80
http://ocsp2.globalsign.com/rootr3/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCDQHuXyId%2FGI71DM6hVc%3D
unknown
binary
1.40 Kb
unknown
3740
Yandex.exe
GET
200
104.18.21.226:80
http://ocsp.globalsign.com/gseccovsslca2018/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSTMjK03nNiYoQYvu4Izyfn9OJNdAQUWHuOdSr%2BYYCqkEABrtboB0ZuP0gCDHKTQZ%2FO5eSKKEGG7A%3D%3D
unknown
binary
938 b
unknown
3740
Yandex.exe
GET
200
104.18.21.226:80
http://ocsp2.globalsign.com/rootr5/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQiD0S5cIHyfrLTJ1fvAkJWflH%2B2QQUPeYpSJvqB8ohREom3m7e0oPQn1kCDQHuXyKVQkkF%2BQGRqNw%3D
unknown
binary
1.25 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
3048
chrome.exe
239.255.255.250:1900
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2108
chrome.exe
173.194.76.84:443
accounts.google.com
GOOGLE
US
whitelisted
2108
chrome.exe
93.158.134.121:443
browser.yandex.com
YANDEX LLC
RU
whitelisted
2108
chrome.exe
178.154.131.217:443
yastatic.net
YANDEX LLC
RU
whitelisted
2108
chrome.exe
87.250.247.183:443
avatars.mds.yandex.net
YANDEX LLC
RU
whitelisted
2108
chrome.exe
93.158.134.119:443
mc.yandex.ru
YANDEX LLC
RU
whitelisted

DNS requests

Domain
IP
Reputation
accounts.google.com
  • 173.194.76.84
shared
browser.yandex.com
  • 93.158.134.121
whitelisted
yastatic.net
  • 178.154.131.217
  • 178.154.131.215
  • 178.154.131.216
whitelisted
avatars.mds.yandex.net
  • 87.250.247.183
  • 87.250.247.184
  • 87.250.247.181
  • 87.250.247.182
whitelisted
mc.yandex.ru
  • 93.158.134.119
  • 87.250.250.119
  • 77.88.21.119
  • 87.250.251.119
whitelisted
download-paranja.yandex.net
  • 93.158.134.121
whitelisted
mc.yandex.com
  • 77.88.21.119
  • 93.158.134.119
  • 87.250.251.119
  • 87.250.250.119
whitelisted
yandex.ru
  • 5.255.255.77
  • 77.88.55.60
  • 77.88.55.88
  • 5.255.255.70
whitelisted
www.google.com
  • 172.217.16.132
  • 142.250.184.228
whitelisted
download.cdn.yandex.net
  • 5.45.205.245
  • 5.45.205.241
  • 5.45.205.242
  • 5.45.205.243
  • 5.45.205.244
whitelisted

Threats

No threats detected
Process
Message
clidmgr.exe
GetSidFromEnumSess(): i = 0 : szUserName = Administrator, szDomain = USER-PC, dwSessionId = 0
clidmgr.exe
GetSidFromEnumSess(): ProfileImagePath(1) = C:\Users\admin
clidmgr.exe
GetLoggedCreds_WTSSessionInfo(): szUserName = admin, szDomain = USER-PC, dwSessionId = 1
clidmgr.exe
GetSidFromEnumSess(): LsaEnumerateLogonSessions() lpszSid = S-1-5-21-1302019708-1500728564-335382590-1000
clidmgr.exe
GetLoggedCreds_WTSSessionInfo(): szUserName = admin, szDomain = USER-PC, dwSessionId = 1
clidmgr.exe
GetSidFromEnumSess(): LsaEnumerateLogonSessions() lpszSid = S-1-5-21-1302019708-1500728564-335382590-1000
clidmgr.exe
GetSidFromEnumSess(): i = 0 : szUserName = Administrator, szDomain = USER-PC, dwSessionId = 0
clidmgr.exe
GetSidFromEnumSess(): ProfileImagePath(1) = C:\Users\admin